SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Internet of Things
It-sikkerhed 2014
Copenhagen
5-6. February 2014
Agenda
1.  Introduction
2.  Protecting the PC
3.  Cloud security
4.  Internet of things
5.  New security risks 
6.  Openness and transparency
7.  Legal responses
8.  Conclusions
9.  Debate
Page 2
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
1. Introduction
●  Martin von Haller Grønbæk
•  Partner, Bird & Bird
•  Bird & Bird – only international law
firm in Denmark
•  Leading law firm on Cyber- and
network security
•  Former member of Danish IT
Security Council
•  "Open source advocate"
Page 3
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. PC as the node in the network
●  PC revolution brought “power to the people”
●  And to businesses and government – small
and large
●  Rise of the general purpose computer
●  Open for attack
●  Defence of the home front
●  Internet and the network effects
●  PC as the attacked and tool for the attacker

Page 4
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. The birth of the IT Security
industry
● 
● 
● 
● 
● 
● 
● 
● 
● 

Critical mass market
Large number of new customers
Large losses looming
Loss of data and downtime
Inconvenience and lost productivity
(and big corporate monetary losses)
Malware
Spam
Date theft

Page 5
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. “Thou Shall Protect Thyself”
●  Self-protection
●  Liability rests with the PC-user
●  Hardware and software comes with no
warranties
●  No legal protection
●  Little market for “safe IT” among consumers
●  Large market for add-on IT security software
●  Large numbers of small payments makes big
profits
●  Many small and large providers
Page 6
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
3. New market conditions
● 
● 
● 
● 
● 
● 
● 
● 

Cloud computing!
No more local applications
Computing takes places in the cloud
Less asymmetric information
Much fewer customers
Dramatic shift in bargaining power
And technical challenges!
Goodbye, many small and large IT-security
firms

Page 7
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
3. Is the cloud more “secure”?
● 
● 
● 
● 
● 
● 
● 

Fewer amateurs and more professionals
Very specialized cloud service providers
Cloud as “the fog”
An “oligopoly” of Clouds
User has even less bargaining power
Very little control of data
Very little contractual and legal protection

Page 8
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. Internet of Things
● 
● 
● 
● 
● 
● 
● 

Not everything is moving into the Cloud
Moore Law
Mobile devices
Quantified self
Health, Energy, Automotive etc.
Nano
Gartner: $1.9 trillion to the global economy
by 2020
●  Nest acquired for $3.2 billion in cash

Page 9
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. The “true” Internet
● 
● 
● 
● 
● 
● 
● 

The Internet today is asymmetric
More download, less upload
New medium for broadcasting
The Internet is decentralized by nature
Read/Write
Social media: Blogs before Facebook
Mesh or Grid computing

Page 10
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. Towards the “real” Internet?
● 
● 
● 
● 
● 
● 
● 
● 
● 

Free software vs. cloud computing
(Cloud is based on open source software)
Plug servers
Every device = a server = a node = equal
Cloud computing backlash
New computing models
Peer2Peer data and processor sharing
Mesh or Grid computing
Innovation!

Page 11
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Before Cloud computing
revisited
● 
● 
● 
● 
● 
● 
● 
● 
● 

Computing moves from cloud to devices
Devicesn
Processing Powern
Internet enabled
Always on
AI or Autonomous
Remotely accessed and controlled
Who’s the user?
Self-protection?

Page 12
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Same but bigger security risks
● 
● 
● 
● 
● 
● 
● 
● 
● 

Bigger threats than PC
Obvious network effects
Inconvenience and lost productivity?
Critical functions: Health, Auto etc.
No checks on AI and automatic functions
Life and death
Systemic risks
DDoS attacks
“To Big to Fail”

Page 13
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Unsecure today!
● 
● 
● 
● 
● 
● 
● 
● 
● 

Starting point: Very unsecure
Devices are shamelessly unpatched
No standards
Little press attention
Before tipping point
But it’ll come!
Industry initiatives
AllSeen, OpenDaylight
Open Auto Alliance, Genivi

Page 14
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
6. Open and transparent
● 
● 
● 
● 
● 
● 
● 
● 
● 

Most devices run on open source software
“Closed” is not an option
One platform: Linux
Less diversity
Economies of scale for malware
Open access promotes discovery
Open use lower barriers of entry for fixes
Huge user advantages from open platforms
Closed options where appropriate

Page 15
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Legislation
● 
● 
● 
● 
● 
● 
● 
● 
● 

Starting point: No legislation
Industry standards
Contractual demands
Open source security services
Industry and device specific legislation
Heath care
Transportation
Privacy
Service provider, not “technology”

Page 16
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Liability
● 
● 
● 
● 
● 
● 
● 
● 
● 
● 

Who assume the risk of loss?
Who is the better at prevention?
Consumer?
Reversed burden of proof
Strict liability
Who should liable? Vendor, producer, provider?
Don’t kill innovation!
More disclosure of insecurity and breach
Standards of “Good IoT IT security practices”
Strict liability of certain types of devises

Page 17
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Conclusions
●  The IT security industry as we know it will change
dramatically
●  Cloud computed will see a backlash
●  Internet of Things will increase number of Internet
connected computers
●  Old type security threats will re-emerge with a
vengeance
●  Solutions will be based on open source software
●  Maybe new legislation on disclosure and strict liability
for certain devices
●  Invest your money in new IT security start-ups with
IoT solutions!
Page 18
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
8. Questions
●  And maybe some answers…

Page 19
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
Thank You
Martin von Haller Grønbæk
Mobile: +45 40 73 19 14
Email: Martin.vonhaller@twobirds.com
Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses.
Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the
Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and
of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address.
twobirds.com

Weitere ähnliche Inhalte

Was ist angesagt?

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot IoT Tunisia
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT SecurityBill Harpley
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesPeter Waher
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Bob Radvanovsky
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides Francisco Maroto
 
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?3G4G
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial ThingsSenrio
 
Attack and Defence in Mobile Apps
Attack and Defence in Mobile AppsAttack and Defence in Mobile Apps
Attack and Defence in Mobile AppsDavid Johansson
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention ApproachesCipherCloud
 
Internet of manufacturing and Open Source
Internet of manufacturing and Open SourceInternet of manufacturing and Open Source
Internet of manufacturing and Open SourceIan Skerrett
 

Was ist angesagt? (20)

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Neotel
Neotel Neotel
Neotel
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016
 
Cl16 wit io_t
Cl16 wit io_tCl16 wit io_t
Cl16 wit io_t
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
 
Industry 4.0 and the Industrial Internet of Things (IIoT) - e+h june 2018 ...
Industry 4.0 and the Industrial Internet of Things (IIoT) -  e+h june 2018   ...Industry 4.0 and the Industrial Internet of Things (IIoT) -  e+h june 2018   ...
Industry 4.0 and the Industrial Internet of Things (IIoT) - e+h june 2018 ...
 
Attack and Defence in Mobile Apps
Attack and Defence in Mobile AppsAttack and Defence in Mobile Apps
Attack and Defence in Mobile Apps
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
Internet of manufacturing and Open Source
Internet of manufacturing and Open SourceInternet of manufacturing and Open Source
Internet of manufacturing and Open Source
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
 

Ähnlich wie Internet of Things and new security challenges for the IT industry

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015HildebrandTech
 
Ignite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and PrivacyIgnite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and Privacyjoshuacooper
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022The Digital Insurer
 
How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateSEEBURGER
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022The Digital Insurer
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Bessie Wang
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud Native Day Tel Aviv
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
 
Cloudera for Internet of Things
Cloudera for Internet of ThingsCloudera for Internet of Things
Cloudera for Internet of ThingsCloudera, Inc.
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Mythscumulocity
 

Ähnlich wie Internet of Things and new security challenges for the IT industry (20)

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Ignite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and PrivacyIgnite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and Privacy
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022
 
How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform Innovate
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
Cloudera for Internet of Things
Cloudera for Internet of ThingsCloudera for Internet of Things
Cloudera for Internet of Things
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Myths
 

Mehr von Martin von Haller Groenbaek

Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)Martin von Haller Groenbaek
 
Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)Martin von Haller Groenbaek
 

Mehr von Martin von Haller Groenbaek (20)

Joomladay 2014 - Open source licenses
Joomladay 2014 - Open source licensesJoomladay 2014 - Open source licenses
Joomladay 2014 - Open source licenses
 
Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012) Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012)
 
Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)
 
Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)
 
BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)
 
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
 
Going local (08-12-2011)
Going local (08-12-2011)Going local (08-12-2011)
Going local (08-12-2011)
 
Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)
 
Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)
 
Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)
 
Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)
 
CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)
 
IDC Skyen eller Tågen (29-09-2011)
IDC Skyen eller Tågen (29-09-2011)IDC Skyen eller Tågen (29-09-2011)
IDC Skyen eller Tågen (29-09-2011)
 
Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)
 
Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)
 
Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)
 
Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)
 
Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)
 
Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)
 
Scl open source (15 10-2010)
Scl open source (15 10-2010)Scl open source (15 10-2010)
Scl open source (15 10-2010)
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Internet of Things and new security challenges for the IT industry

  • 1. Internet of Things It-sikkerhed 2014 Copenhagen 5-6. February 2014
  • 2. Agenda 1.  Introduction 2.  Protecting the PC 3.  Cloud security 4.  Internet of things 5.  New security risks  6.  Openness and transparency 7.  Legal responses 8.  Conclusions 9.  Debate Page 2 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 3. 1. Introduction ●  Martin von Haller Grønbæk •  Partner, Bird & Bird •  Bird & Bird – only international law firm in Denmark •  Leading law firm on Cyber- and network security •  Former member of Danish IT Security Council •  "Open source advocate" Page 3 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 4. 2. PC as the node in the network ●  PC revolution brought “power to the people” ●  And to businesses and government – small and large ●  Rise of the general purpose computer ●  Open for attack ●  Defence of the home front ●  Internet and the network effects ●  PC as the attacked and tool for the attacker Page 4 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 5. 2. The birth of the IT Security industry ●  ●  ●  ●  ●  ●  ●  ●  ●  Critical mass market Large number of new customers Large losses looming Loss of data and downtime Inconvenience and lost productivity (and big corporate monetary losses) Malware Spam Date theft Page 5 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 6. 2. “Thou Shall Protect Thyself” ●  Self-protection ●  Liability rests with the PC-user ●  Hardware and software comes with no warranties ●  No legal protection ●  Little market for “safe IT” among consumers ●  Large market for add-on IT security software ●  Large numbers of small payments makes big profits ●  Many small and large providers Page 6 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 7. 3. New market conditions ●  ●  ●  ●  ●  ●  ●  ●  Cloud computing! No more local applications Computing takes places in the cloud Less asymmetric information Much fewer customers Dramatic shift in bargaining power And technical challenges! Goodbye, many small and large IT-security firms Page 7 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 8. 3. Is the cloud more “secure”? ●  ●  ●  ●  ●  ●  ●  Fewer amateurs and more professionals Very specialized cloud service providers Cloud as “the fog” An “oligopoly” of Clouds User has even less bargaining power Very little control of data Very little contractual and legal protection Page 8 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 9. 4. Internet of Things ●  ●  ●  ●  ●  ●  ●  Not everything is moving into the Cloud Moore Law Mobile devices Quantified self Health, Energy, Automotive etc. Nano Gartner: $1.9 trillion to the global economy by 2020 ●  Nest acquired for $3.2 billion in cash Page 9 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 10. 4. The “true” Internet ●  ●  ●  ●  ●  ●  ●  The Internet today is asymmetric More download, less upload New medium for broadcasting The Internet is decentralized by nature Read/Write Social media: Blogs before Facebook Mesh or Grid computing Page 10 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 11. 4. Towards the “real” Internet? ●  ●  ●  ●  ●  ●  ●  ●  ●  Free software vs. cloud computing (Cloud is based on open source software) Plug servers Every device = a server = a node = equal Cloud computing backlash New computing models Peer2Peer data and processor sharing Mesh or Grid computing Innovation! Page 11 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 12. 5. Before Cloud computing revisited ●  ●  ●  ●  ●  ●  ●  ●  ●  Computing moves from cloud to devices Devicesn Processing Powern Internet enabled Always on AI or Autonomous Remotely accessed and controlled Who’s the user? Self-protection? Page 12 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 13. 5. Same but bigger security risks ●  ●  ●  ●  ●  ●  ●  ●  ●  Bigger threats than PC Obvious network effects Inconvenience and lost productivity? Critical functions: Health, Auto etc. No checks on AI and automatic functions Life and death Systemic risks DDoS attacks “To Big to Fail” Page 13 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 14. 5. Unsecure today! ●  ●  ●  ●  ●  ●  ●  ●  ●  Starting point: Very unsecure Devices are shamelessly unpatched No standards Little press attention Before tipping point But it’ll come! Industry initiatives AllSeen, OpenDaylight Open Auto Alliance, Genivi Page 14 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 15. 6. Open and transparent ●  ●  ●  ●  ●  ●  ●  ●  ●  Most devices run on open source software “Closed” is not an option One platform: Linux Less diversity Economies of scale for malware Open access promotes discovery Open use lower barriers of entry for fixes Huge user advantages from open platforms Closed options where appropriate Page 15 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 16. 7. Legislation ●  ●  ●  ●  ●  ●  ●  ●  ●  Starting point: No legislation Industry standards Contractual demands Open source security services Industry and device specific legislation Heath care Transportation Privacy Service provider, not “technology” Page 16 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 17. 7. Liability ●  ●  ●  ●  ●  ●  ●  ●  ●  ●  Who assume the risk of loss? Who is the better at prevention? Consumer? Reversed burden of proof Strict liability Who should liable? Vendor, producer, provider? Don’t kill innovation! More disclosure of insecurity and breach Standards of “Good IoT IT security practices” Strict liability of certain types of devises Page 17 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 18. 7. Conclusions ●  The IT security industry as we know it will change dramatically ●  Cloud computed will see a backlash ●  Internet of Things will increase number of Internet connected computers ●  Old type security threats will re-emerge with a vengeance ●  Solutions will be based on open source software ●  Maybe new legislation on disclosure and strict liability for certain devices ●  Invest your money in new IT security start-ups with IoT solutions! Page 18 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 19. 8. Questions ●  And maybe some answers… Page 19 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 20. Thank You Martin von Haller Grønbæk Mobile: +45 40 73 19 14 Email: Martin.vonhaller@twobirds.com Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses. Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address. twobirds.com